Unauthorized use is prohibited; usage may be subject to security testing and monitoring; misuse is subject to criminal prosecution;
and users have no expectation of privacy except as otherwise provided by applicable privacy laws.